Malicious Social Bot Using Twitter Network Analysis in Django

Authors

  • Ms. N. Ezhil Arasi PG Student, Kings Engineering College, Sriperumbudhur, Tamil Nadu, India Author
  • Dr. G Manikandan Professor, Kings Engineering College, Sriperumbudhur, Tamil Nadu, India, India Author
  • Ms. S. Hemalatha Assistant Professor, Kings Engineering College, Sriperumbudhur, Tamil Nadu, India Author
  • Ms. Vilma Veronica Assistant Professor, Kings Engineering College, Sriperumbudhur, Tamil Nadu, India Author

DOI:

https://doi.org/10.32628/IJSRST52411222

Keywords:

Agent-based Modelling, Agent-based Social Simulation, Multi-agent Systems, Social Media, Twitter, Twitter Bot

Abstract

Malicious social bots generate fake tweets and automate their social relationships either by pretending to be a followers or by creating multiple fake accounts with malicious activities. Moreover, malicious social bots post shortened malicious URLs in the tweets to redirect the requests of online social networking participants to some malicious servers. Hence, distinguishing malicious social bots from legitimate users is one of the most important tasks in the Twitter network. To detect malicious social bots, extracting URL-based features (such as URL redirection, frequency of shared URLs, and spam content in URL) consumes less amount of time in comparison with social graph-based features (which rely on the social interactions of users). Furthermore, malicious social bots cannot easily manipulate URL redirection chains. In this article, learning automata-based malicious social bot detection (LA-MSBD) algorithm is proposed by integrating a trust computation model with URL-based features for identifying trustworthy participants (users) in the Twitter network. The proposed trust computation model contains two parameters, namely, direct trust and indirect trust. Moreover, the direct trust is derived from Bayes’ theorem, and the indirect trust is derived from the Dempster– Shafer theory (DST) to determine the trustworthiness of each participant accurately. Finally, we shown the user tweet data in terms of graph visualization of bar chart and pie chart of the system. Experimental results shown the better performance of the system.              

Downloads

Download data is not yet available.

References

Lingam, G., Rout, R. R., Somayajulu, D. V., & Ghosh, S. K. (2020). Particle swarm optimization on deep reinforcement learning for detecting social spam bots and spam-influential users in twitter network. IEEE Systems Journal, 15(2), 2281-2292.

Lingam, G., Rout, R. R., Somayajulu, D. V., & Das, S. K. (2020, October). Social botnet community detection: a novel approach based on behavioral similarity in twitter network using deep learning. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (pp. 708-718).

Guo, Q., Xie, H., Li, Y., Ma, W., & Zhang, C. (2021). Social bots detection via fusing bert and graph convolutional networks. Symmetry, 14(1), 30.

Heidari, M., Jones Jr, J. H., & Uzuner, O. (2022). Online user profiling to detect social bots on twitter. arXiv preprint arXiv:2203.05966.

Pham, P., Nguyen, L. T., Vo, B., & Yun, U. (2022). Bot2Vec: A general approach of intra-community oriented representation learning for bot detection in different types of social networks. Information Systems, 103, 101771.

Downloads

Published

03-04-2024

Issue

Section

Research Articles

How to Cite

Malicious Social Bot Using Twitter Network Analysis in Django. (2024). International Journal of Scientific Research in Science and Technology, 11(2), 114-113. https://doi.org/10.32628/IJSRST52411222

Most read articles by the same author(s)

Similar Articles

1-10 of 61

You may also start an advanced similarity search for this article.